Search for persons
X
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
3
Creating from Noise: Trace Generations Using Diffusion Mode..:
, In:
?
Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science ,
4
A Desynchronization-Based Countermeasure Against Side-Chann..:
, In:
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
5
Using Model Optimization as Countermeasure against Model Re..:
, In:
?
2023 Design, Automation & Test in Europe Conference & Exhibition (DATE) ,
6
Non-Profiled Side-Channel Assisted Fault Attack: A Case Stu..:
, In:
?
2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD) ,
7
Invited Paper: Machine Learning Based Blind Side-Channel At..:
, In:
?
2022 IEEE International Symposium on Electromagnetic Compatibility & Signal/Power Integrity (EMCSI) ,
8
On (in)Security of Edge-based Machine Learning Against Elec..:
, In:
?
Security and Artificial Intelligence; Lecture Notes in Computer Science ,
11
Traditional Machine Learning Methods for Side-Channel Analy..:
, In:
?
Security and Artificial Intelligence; Lecture Notes in Computer Science ,
12
On Implementation-Level Security of Edge-Based Machine Lear..:
, In:
?
Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security ,
13
WaC : First Results on Practical Side-Channel Attacks on..:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021 ,
15